ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-61D90ED3AEF5
|
Infrastructure Scan
ADDRESS: 0xdcd7ff5adeb8046a8cebe121f0c009be7b206658
DEPLOYED: 2026-04-28 06:09:47
LAST_TX: 2026-04-30 12:33:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Metadata hash (IPFS): ad66f459…3e8e51b5… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0xd7e3c683 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x2e6b9530f69cf253466a7bb37b6d732c2430217e. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x2e6b9530f69cf253466a7bb37b6d732c2430217e’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xacba97c5102e24ab20f38424b430b498dd1d010c 0x10136379a5a0c7003a33cc1d0db00ecd52a0f75f 0x4b2174440ccd3126618a5e26bb9a98b5c7d48651 0x37ff219e6cf6b72221cc48ef957762f78c98ce91 0xa8a909ead031eb59619ac277c0aa1ff6f3c90521 0x21732fda63218356bf5fd1f078fe8f5ec308f284 0xe5a9c82bed9cd844725b871a7a9acdf663ddbf9f 0x7691a1a00e45c8b0c88e103e9ab85729d20d5dbe 0xdcb97dfc7f1456ca8802f7994ada2bd363224663 0x4216d80ed371bf06ff0ffe3f12eba41328c539f8 0x5bc6a17702445e4e4ee2a4edc1d5f5ff54a3bd19 0x25076e64f84d15cdd6d3e55e065176d93f911a5d 0x909d3c518b627a9c0bd29cf9e831172a6ad3997f 0xca6f67ae992cd6440fdfc36d7770ccf1045700fe 0x9deba2201fd9b7c87776c2f7bfe055eaac607229 0xb2720d6ddea7eb11350c81720058b6e5892a185d 0x3e4bfafb551205ec4ccf97d177472eecfb1c1cdd 0xe031fb7863916558faf3f699f450f21f2ae4f5d4 0xf3387cbdf35a03c8d23282b115ffab6b83b5648a 0x916ca784b88b9b1df2da147102a9a5561dcde009